Module 4
Module 4
&
IT ACT 2000
1
What is a cyber threat?
2
TYPES OF CYBER CRIMES
Cyber crimes
Web jacking
Denial of
Information E-mail Salami Trojan
Hacking Service
Theft bombing attacks attacks
attacks
3
Cyber Law?
Cyber Law is the law governing cyber space.
• Cyber Crimes
• Electronic and Digital Signatures
• Intellectual Property
• Data Protection and Privacy
4
Need for Cyber Law
Cyberspace
• Intangible.
• disrespect for jurisdictional boundaries.
• gigantic traffic volumes every second
• open to participation
• enormous potential for anonymity
• extreme mobility
5
Information Technology Act, 2000
• Enacted on 17th May
2000- India is 12th
nation in the world to
adopt cyber laws
• IT Act is based on
Model law on
e-commerce adopted by
UNCITRAL(un
COMMISSION ON
INTL.TRADE LAW)
6
Objectives of the IT Act
To provide legal recognition for transactions:-
• Carried out by means of electronic data interchange, and other
means of electronic communication, commonly referred to as
"electronic commerce“
• To facilitate electronic filing of documents with Government
agencies and E-Payments
• To amend the Indian Penal Code, Indian Evidence Act,1872,
the Banker’s Books Evidence Act 1891,Reserve Bank of India
Act ,1934
7
Important provisions of IT Act, 2000
• Legal recognition to electronic records- Section 4 of
IT Act.
• Legal recognition of digital signatures- Section 5 of
IT Act, 2000
• Section 6- Use of electronic records and digital
signatures in Government and its agencies.
• Section 7- Retention of electronic records
1. Information should remain accessible for subsequent
reference
2. Retained in a format that ensures accuracy
3. Details of dispatch and receipt are available.
8
Offences & Relevant Sections under IT Act
9
Data theft
According to the section 2 of Information Technology Act,
“Data Theft”- It is the term used when any information in the form of data
is illegally copied or taken from a business or other individual without his
knowledge or consent.
10
Computer Related Crimes under IPC and
Special Laws
Sending threatening messages by email Sec 503 IPC
Sending defamatory messages by email Sec 499, 500 IPC
11
Section 65: Source Code
• Most important asset of software companies
• “Computer Source Code" means the listing of
programmes, computer commands, design and layout
• Ingredients
– Knowledge or intention
– Concealment, destruction, alteration
– computer source code required to be kept or
maintained by law
• Punishment
– imprisonment up to three years and / or
– fine up to Rs. 2 lakh
12
Section 66: Hacking
• Ingredient
s– Intention or Knowledge to cause wrongful loss
or damage to the public or any
– person
Destruction, deletion, alteration, diminishing
value or utility or injuriously affecting
information residing in a computer
resource
• Punishmen
t– imprisonment up to three years, and / or
– fine up to Rs. 2
lakh
• Cognizable, Non Bailable,
Section 66 covers data theft aswell as data alteration
13
[1.] The Information Technology Act, Author: S.R. Bhansali
[2.] Internet Law, Author: Rodney D. Ryder
[3.] Information Technology Law and Practice, Author: Vakul
Sharma
[4.] International Journal of Law and Information Technology
[5.] Indian Journal of Law [Manupatra]
[6.] https://www.computerhope.com/jargon/c/cyber-law.htm
[7.] https://en.wikipedia.org/wiki/IT_law
[8.] https://www.meity.gov.in/content/cyber-laws